We use cookies to give you the best online experience. By using our website you agree to our use of cookies in accordance with our cookie policy.

Contact us today!305-944-7300

Palindrome Consulting Blog

Palindrome Consulting has been serving the Hollywood area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How to Maintain Your Employees’ Health for Everyone’s Well-Being

How to Maintain Your Employees’ Health for Everyone’s Well-Being

It isn’t often that one hears it discussed in the office, but the human body is an incredible piece of technology. Since your employees are so key to your business’ success, you’d benefit from doing everything you could to help your employees to take good care of their physical health.

Continue reading
0 Comments

Don’t Get Scammed with Gift Cards

Don’t Get Scammed with Gift Cards

It’s the holiday season, and shoppers are flocking to stores to find the perfect gift for anyone: the gift card. However, these handy little plastic rectangles may not be so perfect after all. This year, they’ve been a key component to a business email compromise scam that has been popular in the past few months.

Continue reading
0 Comments

Getting to Know Technology: Username

Getting to Know Technology: Username

When you sign up for any service online, you will be asked to create a username and a password. Today, we will be going over the purpose of a username and provide you with some best practices on how to create a username that works to your benefit.

Continue reading
0 Comments

4 Internal Threats Every Business Owner Should Understand

4 Internal Threats Every Business Owner Should Understand

In light of all the data leaks and vulnerabilities that have been brought to light over the past few years, network security has to be a priority for every business. One problem many organizations have is that while they are protecting their network and infrastructure from threats outside their company, the real threats are actually coming from inside. Today, we’ll look at four ways threats can cause havoc from inside your organization.

Continue reading
0 Comments

New Study Shows Passwords Can, In Fact, be Remembered

b2ap3_thumbnail_people_remember_passwords_400.jpgWe see a lot of password-bashing these days, and some people have lost faith in them as a security measure. But, unfortunately, a lot of the blame for this lies in human memory. We just don’t pick passwords that are strong enough. In fact, a mind-numbing one in 20 people still use “password” to keep their information safe.

Continue reading
0 Comments

YouTube Makes an Effort to Be a Nicer Place

b2ap3_thumbnail_comments400.jpgPerouse the YouTube comments on any popular video and it will appear like a teenybopper is texting a neo nazi. The level of stupidity seen in the comments of YouTube is the ultimate proof of human idiocy. Finally, after years of putting up with people's hate and ignorance, YouTube is cracking down on comments!

Continue reading
0 Comments

Tip: Use Microsoft Office without the Mouse

b2ap3_thumbnail_Keyboard400.jpgThe mouse may look like a helpful piece of technology, but be warned; it's actually a tool of destruction. If your mouse has been your sidekick for years of heavy computer usage, then your wrist might be in danger of carpal tunnel syndrome. Sometimes, it's nice to take a break from the mouse and use your keyboard to navigate Microsoft Office.

Continue reading
0 Comments

Whatever Happened to Disk Defragmentation?

b2ap3_thumbnail_DiskDefrag400.jpgIf you have been working with Windows operating systems for more than a few years, then you have heard about defrag. To help keep your PC running smoothly, it has always been considered a solid practice to routinely perform a disk defragmentation on your hard drive. Recently, however, you may not have heard much about defragging. Is defragging still necessary?

Continue reading
0 Comments

4 Oversights that will Harm Your Network

b2ap3_thumbnail_SecurtyRisk400.jpgWith all the attention that hackers receive, you would think that they are solely responsible for every network security breach, but the truth of the matter is that most damages to company networks are due to negligence. Here are the four most common IT security oversights that can lead to major damages to your network.

Continue reading
0 Comments

Sign Up for Our Newsletter

  • Company Name *
  • First Name *
  • Last Name *

      Account Login

      Mobile? Grab this Article!

      QR-Code

      Blog Archive

      2019
      March
      April
      May
      June
      July
      August
      September
      October
      November
      December
      2008
      January
      February
      March
      April
      May
      June
      July
      August
      September
      October